Customer Identity Access Management

Protect customer accounts from misuse with cIAM

Customer identities are valuable and must be protected. Prevent the misuse of customer logins with Customer Identity and Access Management (cIAM).

As a company, your customer login credentials are always vulnerable to cyberattack. In fact, credentials are a popular gateway for attacks. For data protection reasons and to avoid reputational risk, optimally protecting your customer details should be high on your agenda. Whilst you may not be intimately aware of your customers’ security habits, password reuse is a well-known problem.  

With central cIAM from Swisscom, you can implement effective authentication measures to safeguard identities. And with Continuous Adaptive Trust (CAT) monitoring of access behaviour, you can also respond immediately to suspicious activity before any damage occurs. Flexible and modern authentication methods guarantee a successful customer experience.  

When is it the right solution?

As a company, you have an obligation to protect customer data. You therefore need a solution for the standardised management of customer registration and access, even across multiple systems. It is also important that your company’s security requirements are complied with and that any misuse is detected swiftly.

A central customer Identity and Access Management solution allows you to deal with multiple security issues at once. You can effectively secure logins using the latest two-factor authentication methods (2FA).

Continuous Adaptive Trust (CAT) enables you to quickly detect cyberattacks using stolen credentials and prevent suspicious behaviour with automated security mechanisms such as additional authentication. You can also integrate cIAM into your existing user directories, such as Active Directory or LDAP solutions.

Your benefits

  • Professional: centrally managed cIAM using advanced authentication methods
  • Integrated: transform existing directories into a comprehensive identity and access management
  • Compliant: manage users in accordance with Swiss law and regulatory requirements 

Use Cases: cIAM in practice

cIAM from Swisscom is a managed service based on proven technologies and best practices. Identity and Access Management integrates seamlessly with existing environments to ensure compliance with your security requirements.  

Use proven and predefined processes for:

  • The provisioning and rollout of hardware tokens to meet the tightest security requirements
  • Customisable self-service processes for user registration and password reset
  • Easy-to-use smartphone MFA solutions from Switzerland

Integrate cIAM with existing user mana­gement solutions such as Active Directory and LDAP directories. Use existing or different login methods, including social logins and self-adminis­tration on My Swisscom Business for example. Experienced Swisscom security specialists are on hand to support you with this.

Adapt your security to your needs by incorporating additional authentication methods such as MFA and Continuous Adaptive Trust (CAT). Reduce user interac­tions to the minimum necessary for an optimal customer experience.

Dynamic security mechanisms protect accounts and customers from phishing and MFA fatigue attacks. And location-based protective measures prevent cybercriminals from accessing customer accounts from remote locations. The modular design means that you can purchase the protection mechanisms as required.  

Source cIAM as a managed service from ISO 27001-certified Swiss data centres with data storage in Switzerland. WAAP (Web Appli­cation and API Protection) provides comprehensive protection. Thanks to ongoing development, the solution supports new authenti­cation methods such as the E-ID or SSI (Self-Sovereign Identity) soon after they become available.

Why Swisscom?

Proven, secure methods

Best practices for user registration and 24/7 security monitoring.

Different authentication methods

Includes supporting processes and a straightforward change of method.

Continuous authentication

Ongoing CAT monitoring based on current security needs.

Learn more about security

Related items

Our experts will be happy to answer your questions. Contact us.